Vulnerability Name:

CVE-2022-23308 (CCN-220772)

Assigned:2022-02-19
Published:2022-02-19
Updated:2022-11-02
Summary:valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
8.1 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.3 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-416
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2022-23308

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20220516 APPLE-SA-2022-05-16-1 iOS 15.5 and iPadOS 15.5

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20220516 APPLE-SA-2022-05-16-5 watchOS 8.6

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20220516 APPLE-SA-2022-05-16-6 tvOS 15.5

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4

Source: XF
Type: UNKNOWN
libxml2-cve202223308-dos(220772)

Source: CCN
Type: libxml2 GIT Repository
libxml2

Source: CCN
Type: libxml2 GIT Repository
[CVE-2022-23308] Use-after-free of ID and IDREF attributes

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e

Source: MISC
Type: Release Notes, Third Party Advisory
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20220408 [SECURITY] [DLA 2972-1] libxml2 security update

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2022-050c712ed7

Source: GENTOO
Type: Third Party Advisory
GLSA-202210-03

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20220331-0008/

Source: CCN
Type: Apple security document HT213253
About the security content of watchOS 8.6

Source: CCN
Type: Apple security document HT213254
About the security content of tvOS 15.5

Source: CCN
Type: Apple security document HT213255
About the security content of Security Update 2022-004 Catalina

Source: CCN
Type: Apple security document HT213256
About the security content of macOS Big Sur 11.6.6

Source: CCN
Type: Apple security document HT213257
About the security content of macOS Monterey 12.4

Source: CCN
Type: Apple security document HT213258
About the security content of iOS 15.5 and iPadOS 15.5

Source: CONFIRM
Type: Third Party Advisory
https://support.apple.com/kb/HT213253

Source: CONFIRM
Type: Third Party Advisory
https://support.apple.com/kb/HT213254

Source: CONFIRM
Type: Third Party Advisory
https://support.apple.com/kb/HT213255

Source: CONFIRM
Type: Third Party Advisory
https://support.apple.com/kb/HT213256

Source: CONFIRM
Type: Third Party Advisory
https://support.apple.com/kb/HT213257

Source: CONFIRM
Type: Third Party Advisory
https://support.apple.com/kb/HT213258

Source: CCN
Type: IBM Security Bulletin 6586492 (MQ Operator CD release)
IBM MQ Operator and Queue manager container images are vulnerable to multiple vulnerabilities from expat, Golang Go, gcc, openssl and libxml.

Source: CCN
Type: IBM Security Bulletin 6601731 (Security Verify Access)
Multiple security vulnerabilities fixed in IBM Security Verify Access Appliance (CVE-2022-23308, CVE-2021-23840, CVE-2021-23841, CVE-2021-3712)

Source: CCN
Type: IBM Security Bulletin 6607135 (QRadar SIEM)
IBM QRadar SIEM Application Framework Base Image is vulnerable to using components with Known Vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6612837 (InfoSphere Identity Insight)
IBM InfoSphere Identity Insight vulnerabilities in third party libraries (CVE-2021-39239, CVE-2022-23308, CVE-2021-29424, CVE-2020-15250, 177835)

Source: CCN
Type: IBM Security Bulletin 6831813 (Netcool Operations Insight)
Netcool Operations Insight v1.6.6 contains fixes for multiple security vulnerabilities.

Source: CCN
Type: IBM Security Bulletin 6832956 (Cloud Pak for Security)
IBM Cloud Pak for Security is vulnerable to using components with known vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6856409 (Cloud Pak for Security)
IBM Cloud Pak for Security includes components with multiple known vulnerabilities

Source: CCN
Type: Oracle CPUJul2022
Oracle Critical Patch Update Advisory - July 2022

Source: N/A
Type: Patch, Third Party Advisory
N/A

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2022-23308

Vulnerable Configuration:Configuration 1:
  • cpe:/a:xmlsoft:libxml2:*:*:*:*:*:*:*:* (Version < 2.9.13)

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:*:*:*:*:*:*:*:* (Version < 15.5)
  • OR cpe:/o:apple:watchos:*:*:*:*:*:*:*:* (Version < 8.6)
  • OR cpe:/o:apple:tvos:*:*:*:*:*:*:*:* (Version < 15.5)
  • OR cpe:/o:apple:ipados:*:*:*:*:*:*:*:* (Version < 15.5)
  • OR cpe:/o:apple:macos:*:*:*:*:*:*:*:* (Version >= 12.0 and < 12.4)
  • OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:* (Version >= 10.15.0 and < 10.15.7)
  • OR cpe:/o:apple:macos:*:*:*:*:*:*:*:* (Version >= 11.6.0 and < 11.6.6)

  • Configuration 5:
  • cpe:/a:netapp:snapdrive:-:*:*:*:*:unix:*:*
  • OR cpe:/a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
  • OR cpe:/a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:smi-s_provider:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:solidfire_&_hci_management_node:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
  • OR cpe:/a:netapp:manageability_software_development_kit:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:solidfire,_enterprise_sds_&_hci_storage_node:-:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:hci_compute_node:-:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h300s:-:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h500s:-:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h700s:-:*:*:*:*:*:*:*

  • Configuration 10:
  • cpe:/o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h300e:-:*:*:*:*:*:*:*

  • Configuration 11:
  • cpe:/o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h500e:-:*:*:*:*:*:*:*

  • Configuration 12:
  • cpe:/o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h700e:-:*:*:*:*:*:*:*

  • Configuration 13:
  • cpe:/o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h410s:-:*:*:*:*:*:*:*

  • Configuration 14:
  • cpe:/o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h410c:-:*:*:*:*:*:*:*

  • Configuration 15:
  • cpe:/a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_cloud_native_core_network_repository_function:22.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_cloud_native_core_network_repository_function:22.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_cloud_native_core_unified_data_repository:22.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_cloud_native_core_binding_support_function:22.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:mysql_workbench:*:*:*:*:*:*:*:* (Version <= 8.0.29)

  • Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:8::baseos:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:xmlsoft:libxml2:2.9.4:-:*:*:*:*:*:*
  • OR cpe:/a:xmlsoft:libxml2:2.9.8:-:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:infosphere_identity_insight:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_verify_access:10.0.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_verify_access:10.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_verify_access:10.0.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_verify_access:10.0.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.10.2.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7702
    P
    libxml2-2-2.10.3-150500.3.1 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:95283
    P
    Security update for libxml2 (Important)
    2022-07-26
    oval:org.opensuse.security:def:600
    P
    Security update for libxml2 (Important)
    2022-07-26
    oval:org.opensuse.security:def:3653
    P
    Security update for libxml2 (Important)
    2022-07-26
    oval:org.opensuse.security:def:3110
    P
    jakarta-taglibs-standard-1.1.1-255.2 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:94740
    P
    libxml2-2-2.9.12-150400.3.4 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:42388
    P
    Security update for libxml2 (Important)
    2022-05-19
    oval:org.opensuse.security:def:893
    P
    Security update for libxml2 (Important)
    2022-05-19
    oval:org.opensuse.security:def:119208
    P
    Security update for libxml2 (Important)
    2022-05-19
    oval:org.opensuse.security:def:119583
    P
    Security update for libxml2 (Important)
    2022-05-19
    oval:org.opensuse.security:def:118901
    P
    Security update for libxml2 (Important)
    2022-05-19
    oval:org.opensuse.security:def:1584
    P
    Security update for libxml2 (Important)
    2022-05-19
    oval:org.opensuse.security:def:491
    P
    Security update for libxml2 (Important)
    2022-05-19
    oval:org.opensuse.security:def:119398
    P
    Security update for libxml2 (Important)
    2022-05-19
    oval:org.opensuse.security:def:118711
    P
    Security update for libxml2 (Important)
    2022-05-19
    oval:org.opensuse.security:def:42289
    P
    Security update for libxml2 (Important)
    2022-05-19
    oval:org.opensuse.security:def:101626
    P
    Security update for libxml2 (Important) (in QA)
    2022-04-29
    oval:org.opensuse.security:def:102145
    P
    Security update for libxml2 (Important) (in QA)
    2022-04-29
    oval:org.opensuse.security:def:126866
    P
    Security update for libxml2 (Important)
    2022-04-22
    oval:org.opensuse.security:def:5223
    P
    Security update for libxml2 (Important)
    2022-04-22
    oval:org.opensuse.security:def:127263
    P
    Security update for libxml2 (Important)
    2022-04-22
    oval:org.opensuse.security:def:6017
    P
    Security update for libxml2 (Important)
    2022-04-22
    oval:org.opensuse.security:def:125700
    P
    Security update for libxml2 (Important)
    2022-04-22
    oval:org.opensuse.security:def:42435
    P
    Security update for python-libxml2-python (Important)
    2022-04-19
    oval:com.redhat.rhsa:def:20220899
    P
    RHSA-2022:0899: libxml2 security update (Moderate)
    2022-03-15
    oval:org.opensuse.security:def:1587
    P
    Security update for python-libxml2-python (Important)
    2022-03-10
    oval:org.opensuse.security:def:119518
    P
    Security update for python-libxml2-python (Important)
    2022-03-10
    oval:org.opensuse.security:def:118840
    P
    Security update for python-libxml2-python (Important)
    2022-03-10
    oval:org.opensuse.security:def:100093
    P
    (Important)
    2022-03-10
    oval:org.opensuse.security:def:101659
    P
    Security update for python-libxml2-python (Important)
    2022-03-10
    oval:org.opensuse.security:def:99224
    P
    (Important)
    2022-03-10
    oval:org.opensuse.security:def:967
    P
    Security update for python-libxml2-python (Important)
    2022-03-10
    oval:org.opensuse.security:def:100431
    P
    (Important)
    2022-03-10
    oval:org.opensuse.security:def:119335
    P
    Security update for python-libxml2-python (Important)
    2022-03-10
    oval:org.opensuse.security:def:99498
    P
    (Important)
    2022-03-10
    oval:org.opensuse.security:def:119703
    P
    Security update for python-libxml2-python (Important)
    2022-03-10
    oval:org.opensuse.security:def:119030
    P
    Security update for python-libxml2-python (Important)
    2022-03-10
    oval:org.opensuse.security:def:100765
    P
    (Important)
    2022-03-10
    oval:org.opensuse.security:def:102147
    P
    Security update for python-libxml2-python (Important)
    2022-03-10
    oval:org.opensuse.security:def:99760
    P
    (Important)
    2022-03-10
    oval:org.opensuse.security:def:119141
    P
    Security update for python-libxml2-python (Important)
    2022-03-10
    BACK
    xmlsoft libxml2 *
    fedoraproject fedora 34
    debian debian linux 9.0
    apple mac os x 10.15.7 security_update_2020-001
    apple mac os x 10.15.7 security_update_2021-001
    apple mac os x 10.15.7 security_update_2021-002
    apple mac os x 10.15.7
    apple mac os x 10.15.7 security_update_2021-003
    apple mac os x 10.15.7 security_update_2021-004
    apple mac os x 10.15.7 security_update_2021-005
    apple mac os x 10.15.7 security_update_2021-006
    apple mac os x 10.15.7 security_update_2021-008
    apple mac os x 10.15.7 security_update_2022-001
    apple mac os x 10.15.7 security_update_2021-007
    apple iphone os *
    apple watchos *
    apple tvos *
    apple ipados *
    apple macos *
    apple mac os x 10.15.7 security_update_2022-003
    apple mac os x *
    apple macos *
    netapp snapdrive -
    netapp snapmanager -
    netapp ontap select deploy administration utility -
    netapp clustered data ontap -
    netapp smi-s provider -
    netapp clustered data ontap antivirus connector -
    netapp solidfire & hci management node -
    netapp active iq unified manager -
    netapp manageability software development kit -
    netapp solidfire, enterprise sds & hci storage node -
    netapp bootstrap os -
    netapp hci compute node -
    netapp h300s firmware -
    netapp h300s -
    netapp h500s firmware -
    netapp h500s -
    netapp h700s firmware -
    netapp h700s -
    netapp h300e firmware -
    netapp h300e -
    netapp h500e firmware -
    netapp h500e -
    netapp h700e firmware -
    netapp h700e -
    netapp h410s firmware -
    netapp h410s -
    netapp h410c firmware -
    netapp h410c -
    oracle zfs storage appliance kit 8.8
    oracle communications cloud native core network function cloud native environment 22.1.0
    oracle communications cloud native core network repository function 22.2.0
    oracle communications cloud native core network repository function 22.1.2
    oracle communications cloud native core unified data repository 22.2.0
    oracle communications cloud native core binding support function 22.2.0
    oracle communications cloud native core network slice selection function 22.1.1
    oracle mysql workbench *
    xmlsoft libxml2 2.9.4 -
    xmlsoft libxml2 2.9.8 -
    ibm infosphere identity insight 9.0
    ibm qradar security information and event manager 7.3
    ibm qradar security information and event manager 7.4 -
    ibm security verify access 10.0.2.0
    ibm security verify access 10.0.0.0
    ibm security verify access 10.0.1.0
    ibm security verify access 10.0.3.0
    ibm cloud pak for security 1.10.0.0
    ibm cloud pak for security 1.10.2.0